Technical information

Your access to your claims
You do not need to download an app; an internet connection is sufficient. On the webpage TCM BE CREDITORS ONLINE, you can consult each of your claims in detail, communicate about them, and download statistics.
Request your username and password if needed.

Power BI
The statistics you can access via the online page for creditors (TCM BE CLAIMS ONLINE) are produced through Microsoft Power BI. When you log in, you gain access to this powerful tool that allows you to process and analyze your figures in various ways.

Integration with the existing systems of creditors
If you are a customer of adfinity / Count-e / exact / Yuki / 1616 , an automated data transfer for claims has already been implemented.
We also develop custom APIs (Application Program Interfaces): automated communication between your systems and ours, significantly reducing administrative workload whenever the volume justifies it. (Example Yuki)
Read more.

Cloud-based servers
Debt collection is carried out by people—skilled, competent individuals trained to listen and advise. To concentrate on what truly matters, they need the right support. Our computer systems are designed specifically for that purpose and are regularly maintained and updated. Our credit controllers have access to the latest information and can work with it in a structured way.
Our systems are cloud-based and can be accessed worldwide through a simple internet connection.
- Our collection software is hosted on AWS: Amazon Web Services
- For email, we use the MS Office 365 platform
- Our telephony runs over the web (voice over IP)
One of the most obvious advantages of such a structure is the ability to work from home. Another major advantage is that creditors can easily access their claims.

(Sec)ure(d)
Creditors (and GDPR legislation) require assurance in terms of accessibility (hacking) and back‑up.
- Back-ups: these systems are backed up in the most professional manner. No information can be lost; if something goes wrong, only a few hours of work could potentially be affected.
- Collection Database Security: our AWS database is regularly tested using penetration tests, protected by layers of specialised security software and managed by highly skilled experts: EASI.
- E-mail protection: e-mail traffic is filtered for harmful content through a layer of security software between Office365 and our PCs.
- Protection against threats and malicious activities: our PCs are secured with an Autonomous Artificial Intelligence Endpoint Security Platform. This system, SentinelOne, monitors activity on the PCs, detects suspicious tasks, and can even revert the system to a previous safe state if necessary.
- Password management and policy: our employees use a reputable password manager (Dashlane) to ensure that every application uses a unique password that is regularly updated.
Skilled hackers may still be able to find vulnerabilities in security systems, but only if the reward is worth the risk.
Telephony
Telephony is an indispensable tool in debt collection: we must remain easily reachable (you can test this at any time), and we must be able to link incoming calls to people/files.
- Identification: Incoming calls activate our collection software to identify the claim and the caller, allowing us to personally address the caller (“Hello M. Smith…”), which benefits both efficiency and quality.
- Other communication channels: The system generates letters, e‑mails, text messages, etc.

Scanning
- Incoming documents: all documents are scanned and stored in the correct file in the database.
- Outgoing documents: all outgoing documents are archived as PDFs and saved in the correct file in the database. If applicable, they are transferred to a third party via physical mail.

Banking and payments from debtors
- Our letters, e‑mails and text messages to debtors contain a QR code (or link to the payment application) that simplifies processing and minimises possible errors.
- Payments from debtors go into a separate, specialised banking account (third‑party account). Most payments include the correct reference and are automatically allocated—without manual intervention—to the correct claim.
- Each day we download the CODA files from the bank. Our system reads these files so that payments are always correctly assigned.
This leaves no room for mistakes.

Transfer of collected funds and invoicing
- We standardly transfer the collected funds once per month. We could do this more frequently, but that would create more administrative work for creditors (for us, automation limits the impact). However, we can transfer funds at any desired moment upon your specific request.
- We transfer the funds to the bank account listed in your contract, or to the account you have specifically and formally requested. Your banking details are securely stored in our database, and manual tasks are minimised to avoid mistakes.
- Every amount collected in a file and not yet transferred is automatically selected by the system, enabling an invoice to be generated (remittance report). The payment follows afterward.






